High-Speed Chase on the Information Superhighway: the Evolution of Criminal Liability for Internet Piracy
Total Page:16
File Type:pdf, Size:1020Kb
Loyola of Los Angeles Law Review Volume 33 Number 1 Article 6 11-1-1999 High-Speed Chase on the Information Superhighway: The Evolution of Criminal Liability for Internet Piracy Shahram A. Shayesteh Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Law Commons Recommended Citation Shahram A. Shayesteh, High-Speed Chase on the Information Superhighway: The Evolution of Criminal Liability for Internet Piracy, 33 Loy. L.A. L. Rev. 183 (1999). Available at: https://digitalcommons.lmu.edu/llr/vol33/iss1/6 This Notes and Comments is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. HIGH-SPEED CHASE ON THE INFORMATION SUPERHIGHWAY: THE EVOLUTION OF CRIMINAL LIABILITY FOR INTERNET PIRACY I. INTRODUCTION The Internet is known by many names: the Information Super- highway, the World Wide Web,' the National Information Infra- structure,2 or simply "the Net." However confusing this terminology may be, most people in modem countries today are very much aware of the Internet and its growing popularity. The Computer Industry Almanac estimates that by the end of 1998, approximately 150 mil- lion people worldwide were "surfing" the Internet, up from nearly 40 million in 1995. 3 Nowadays, the number of Internet users is growing exponentially, expected to reach an estimated 320 million by 2001 and 720 million by 2006.4 1. Although the World Wide Web is actually only a component of the Internet, it is commonly perceived to be synonymous with the Internet itself. See ACLU v. Reno, 929 F. Supp. 824, 836 (E.D. Pa. 1996), aff'd, Reno v. ACLU, 521 U.S. 844 (1997). 2. The National Information Infrastructure is actually a broader concept that "encompasses digital, interactive services now available, such as the Inter- net, as well as those contemplated for the future." BRUCE A. LEHMAN & RONALD H. BROWN, U.S. DEP'T OF COMMERCE, INTELLECTUAL PROPERTY AND THE NATIONAL INFORMATION INFRASTRUCTURE: THE REPORT OF THE WORKING GROUP ON INTELLECTUAL PROPERTY RIGHTS 2 n.5 (1995), avail- able in U.S. Patent and Trademark Office (visited Sept 14, 1999) <http://www.uspto.gov/web/offices/comldoc/ipnii/index.html> [hereinafter Nil WHITE PAPER]. 3. See North America Is the Leading Region for Internet Users According to the Computer Industry Almanac, PR NEwswiRE, Aug. 17, 1999, available in LEXIS, News Library, PR Newswire File. 4. See id. ("North America will remain the leading region for Internet us- ers until at least 2005. It will grow from about 83 million Internet users at year-end 1998 to nearly 230 million by year-end 2005. West Europe is grow- ing faster than North America and will be a close second by 2005 with over 184 LOYOLA OFLOSANGELESLAWREVIE W [Vol. 33:183 Such massive growth inevitably breeds some unwanted weeds in the garden. The Internet's sheer size and anonymous nature allow countless Internet users to illegally pirate computer software and distribute it on the Internet without fear of apprehension.' Due to the ease with which software can be copied and distributed worldwide- virtually instantaneously--copyright owners have become reluctant to make their protected works readily available on the Internet with- out reasonable assurances against massive piracy.6 For the software industry alone, rampant copyright infringement now accounts for billions of dollars in worldwide losses each year.7 Naturally, soft- ware companies and other copyright-based industries have urged the federal government for years to strengthen copyright protections in order to address the problem.' In 1993, President Clinton formed the Information Infrastructure Task Force for the purpose of articulating and implementing the Administration's policy regarding the Internet, which it has termed the National Information Infrastructure ("Nl").9 This policy was first articulated in a report by the Working Group on Intellectual 10 Property Rights in 1995, commonly known as the "White Paper."' 202 million Internet users. The Asia-Pacific region is growing even faster and will have over 170 million Internet users in 2005."). 5. See Miro Kazakoff, The Ethics of Piracy Internet: The High Seas for Illegal Downloading, HARTFORD COURANT, Aug. 28, 1997, at El; see also Teddy C. Kim, Note, Taming the Electronic Frontier: Software Copyright Protection in the Wake ofUnited States v. LaMacchia, 80 MINN. L. REV. 1255, 1266 (1996) ("Because of the Internet's global breadth, and the ease with which it is navigated, a perpetrator can be very remote from the actual 'crime scene."'). 6. See S. REP. No. 105-190, at 8 (1998). 7. See John G. Spooner, Wizards to Thwart Pirates: Microsoft Registra- tion Wizardfor Office 2000 Premium Edition, PC WEEK, Dec. 14, 1998, avail- able in 1998 WL 25003887 (noting that worldwide losses from piracy in 1995, 1996, and 1997 cost the software industry $13.3 billion, $11.2 billion, and $11.4 billion respectively). 8. See 141 CoNG. REc. S14,550 (daily ed. Sept. 28, 1995) (statement of Sen. Hatch) (discussing the need to enact "rules of the road" to protect copy- righted works traveling on the Information Superhighway). See generally NII WHITE PAPER, supra note 2 (suggesting clarification and amendment of the Copyright Act of 1976 to ensure that the NII reaches its full potential). 9. See NII WHITE PAPER, supra note 2, at 1. 10. See generally NII WHITE PAPER, supra note 2 (report prepared by the Clinton administration to address intellectual property rights in light of new November 1999] IGH-SPEED CHASE The Working Group, headed by Secretary of Commerce Ronald Brown and Commissioner of Patents and Trademarks Bruce Leh- man, argued that, while copyright protection for creative works on the NII was necessary for the NI to develop to its full potential, relatively few amendments to existing copyright law were required." Accordingly, the Working Group's White Paper proposed a few se- lect amendments to the Copyright Act of 1976 ("Copyright Act")'2 in 13 order to "take proper account of the current technology.', Based upon the Working Group's proposals, both houses of Congress proposed several pieces of legislation, which eventually culminated in the passage of two acts in 1998: the No Electronic Theft Act ("NET Act")14 and the Digital Millennium Copyright Act ("DMCA"). 5 These acts were eagerly supported and acclaimed by copyright-based industries, such as software companies, movie stu- dios, record companies, and book publishers. However, in its "high- speed" attempt to curtail the problem of Internet piracy, Congress appears to have given more consideration to the interests of these powerful industry groups than to those of the general public, for whom the benefits of copyright law were originally intended.16 This Comment will examine the current state of criminal liabil- ity for software piracy on the Internet in light of the newly enacted No Electronic Theft Act and Digital Millennium Copyright Act. Part II is a short survey of the Internet, outlining its origins and its various forms of communication. Part HI discusses how federal copyright law, including the NET Act, addresses criminal copyright infringe- ment on the Internet and who is affected by it. Part IV examines the DMCA's criminal provisions and their potential impact on this area of copyright law. Finally, Part V asserts that while the NET Act technologies, particularly the Internet). 11. See NII WHITE PAPER, supra note 2, at 17. 12. Pub. L. No. 94-553, 90 Stat. 2541 (1976) (codified as amended at 17 U.S.C. §§ 101-1101 (1976)). 13. NI WHITE PAPER, supra note 2, at 212. 14. Pub. L. No. 105-147, 111 Stat. 2678 (codified as amended in scattered sections of 17 U.S.C. and 18 U.S.C.). 15. Pub. L. No. 105-304, 112 Stat. 2860 (codified as amended in scattered sections of 17 U.S.C.). 16. See infra Part V. 186 LOYOLA OFLOS ANGELES LA WREVIEW [Vol. 33:183 necessarily fills a void in the Copyright Act, the DMCA is too vague, overbroad, and potentially more harmful than helpful to the public. Part V also posits several alternatives to the drastic criminal meas- ures prescribed by the DMCA. II. A ROADMAP OF THE INFORMATION SUPERHIGHWAY A. Origin of the Internet The Internet was created in 1969 as an experimental project of the Advanced Research Project Agency, and was originally called ARPANET.17 This was a network18 of computers owned by the military, defense contractors, and university laboratories conducting defense-related research.' 9 Soon, ARPANET expanded beyond its origins in the United States to connect to universities, corporations, and people all around the world. 20 During this process, the Defense Advanced Research Projects Agency ("DARPA") developed rules and procedures, called "protocols," for sending and receiving data between computers on the network. 21 Thus, ARPANET eventually came to be known as "DARPA Internet," and finally just the "Inter- 22 net." As ARPANET grew, similar networks were developed to link universities, research facilities, businesses, and individuals to- gether.23 Eventually, each of these private networks were all linked together, allowing users of any computer linked to one of the net- works to transmit communications to each other.24 This series of linked networks--which are linked computer networks themselves- formed the backbone of the modem day Internet.2 ' The Internet now 17. See ACLU v. Reno, 929 F. Supp. 824, 831 (E.D. Pa. 1996). 18. A "network" is a group of computers linked together in order to ex- change files and messages (and to share equipment such as printers).